Cisco Systems 4.2 manual Validating and Using Your Changes, Adding Multiple Cisco AV Pairs

Page 63

Chapter 4 Configuring Cisco Access Registrar 4.2

Configuring a Basic Site

When you need to set an attribute to a value that includes a space, you must double-quote the value, as in the following:

set Framed-Routing "192.168.1.0/24 192.168.1.1"

Adding Multiple Cisco AV Pairs

When you want to add multiple values to the same attribute in a profile, use the following command syntax:

set <attribute> <value1> < value2> < value3>

The AV pairs cannot be added one at a time or each subsequent command will overwrite the previous value. For example, consider the following command entry:

set Cisco-AVpair "vpdn:12tp-tunnel-password=XYZ" "vpdn:tunnel-type=12tp" "vpdn:tunnel-id=telemar" "vpdn:ip-addresses=209.165.200.225"

ls

Cisco-Avpair = vpdn:12tp-tunnel-password=XYZ

Cisco-Avpair = vpdn:tunnel-type=12tp

Cisco-Avpair = vpdn:tunnel-id=telemar

Cisco-Avpair = vpdn:ip-addresses=209.165.200.225

Note The example above is for explanation only; not all attributes and properties are listed.

Validating and Using Your Changes

After you have finished configuring your Cisco AR server, you must save your changes. Saving your changes causes Cisco AR to validate your changes and, if there were no errors, commit them to the configuration database.

Using the save command, however, does not automatically update your server. To update your server you must use the reload command. The reload command stops your server if it is running, and then restarts the server, which causes Cisco AR to reread the configuration database.

You must save and reload your configuration changes in order for them to take effect in the Cisco AR server.

Saving and Reloading

From anywhere in the radius object hierarchy, enter the save and reload commands.

Step 1 Use the save command to save your changes:

save

 

 

Installing and Configuring Cisco Access Registrar, 4.2

 

 

 

 

 

 

OL-17221-02

 

 

4-11

 

 

 

 

 

Image 63
Contents Installing and Configuring Cisco Access Registrar Installing and Configuring Cisco Access Registrar N T E N T S Upgrading Cisco Access Registrar Software Installing Cisco Access Registrar Software from CD-ROM3-14 Creating and Setting Group Membership Configuring Session Management Viii Cisco.com Obtaining DocumentationCisco Product Security Overview Reporting Security Problems in Cisco ProductsYou can access international Cisco websites at this URL Documentation FeedbackCisco Technical Support & Documentation Website Obtaining Technical AssistanceDefinitions of Service Request Severity Submitting a Service RequestXiii Obtaining Additional Publications and InformationXiv Installation Type Installation Dialog OverviewOpen Database Connectivity Installation LocationLicense File Location Java 2 Runtime EnvironmentBase Directory Downloading Cisco Access Registrar SoftwareExample Configuration Continue with InstallationCSCOar-4.2.1-sol10-k9.tar.gz for Solaris Cisco Access Registrar 4.2 LicensingOr stand-by Getting Cisco Access Registrar 4.2 LicenseLicense Slabs License slabs available in CAR 4.2 are listed in TableOpt/CSCOar/bin/arserver restart Installing Cisco Access Registrar 4.2 LicensesAdding Additional Cisco Access Registrar 4.2 Licenses Sample License FileAregcmd -l directoryname Aregcmd Command-Line OptionDisplaying License Information Launching aregcmdOL-17221-02 This chapter contains the following sections Installing the Cisco Access Registrar 4.2 License FileDeciding Where to Install Installing Cisco Access Registrar Software from CD-ROMInstalling Downloaded Software Zcat CSCOar-4.2.1-sol9-K9.tar.gz tar xvf Common Solaris Installation StepsEnter the following command to begin the installation For a full install, press EnterInstalling and Configuring Cisco Access Registrar Enter Y to install the setuid/setgid files RPC Bind Services Installing Cisco Access Registrar 4.2 Software on LinuxInstalling Cisco Access Registrar on LDoms Configuring SnmpCd /cdrom/cdrom0/kit/linux-2.4 Common Linux Installation StepsCp CSCOar-4.2.1-lnx26-install-K9.sh /tmp Chmod 777 CSCOar-4.2.1-lnx26-install-K9.shCSCOar-4.2.1-lnx26-install-k9.sh Enter the name of the script file to begin the installationPreparing OL-17221-02 Solaris Software Upgrade Overview Upgrading Cisco Access Registrar SoftwareLinux Software Upgrade Overview Cd /opt Mv AICar1 CSCOarEtc/init.d/arserver restart Software Upgrade Tasks Disabling ReplicationCd /radius/replication Removing the AICar1 Package Pkgrm AICar1Enter y or yes to continue removing the AICar1 package Removing the CSCOar Package Pkgrm CSCOarEnter y or yes to continue removing the CSCOar package Using uninstall-ar to Remove Linux Software Cd /opt/CSCOar/bin Uninstall-arEnter Yes or Y to continue removing the Linux software Upgrading Cisco Access Registrar Solaris Software Installing the Cisco Access Registrar License FileZcat CSCOar-4.2.1-sol9-k9.tar.gz tar xf Http//java.sun.com Where is the J2RE installed? ?,q Enter Y to preserve the local database Enter the administrator userID and passwordBack-up Copy of Original Configuration Removing Old VSA Names VSA Update ScriptUpgrading Cisco Access Registrar Linux Software Opt/CSCOar/dataServer Run the uninstall-ar program as shown below Cd /opt/CSCOar/bin arserver stopCd /cdrom/cdrom0/kit/linux-2.6 Build Date Fri Nov 07 235551 Enter Y to remove old sessions or N to retain old sessions Oraclehome Backup Copy of Original ConfigurationRemoving Old VSA Names Restarting Replication Configuring SnmpOL-17221-02 General Command Syntax Using aregcmdConfiguring a Basic Site Aregcmd CommandsRunning aregcmd Set Password Changing the Administrator’s PasswordCd //localhost/Administrators Cd adminAdd jane testadmin Configuring the Radius ServerCreating Additional Administrators Cd /AdministratorsChecking the Server’s Health Checking the System-Level DefaultsSet DefaultSessionManager Selecting Ports to UseReload Displaying the UserListsAdd SaveAdd jane Displaying the Default UserListAdding Users to UserLists Ls -RDisplaying UserGroups Use the set command to provide a password for user janeSet password jane Cd /Radius/UserLists/Default Delete bethAdd QuickExampleNAS Configuring ClientsAdding a NAS Cd /Radius/ClientsSet Service-Type Framed Configuring ProfilesSetting Radius Attributes Cd /Radius/Profiles/Default-PPP-users/AttributesSet Framed-Routing 192.168.1.0/24 Validating and Using Your ChangesAdding Multiple Cisco AV Pairs Saving and ReloadingSimple john john Testing Your ConfigurationUsing radclient Radclient -sP001 send Configuring AccountingTroubleshooting Your Configuration Setting the Trace LevelAregcmd Cd /Radius/Advanced/SNMP Enabling Snmp in the Cisco Access Registrar ServerSet Enabled True Stopping the Master AgentOpt/CSCOar/bin/arserver stop Access ControlCreate a view to enable the groups to have rights Modifying the snmpd.conf FileSystem Contact Information Configuring Dynamic DNSRestarting the Master Agent Trap RecipientCd ddns Set Protocol dynamic-dns Cd /Radius/Advanced/DDNS/TSIGKeys Add foo.comCd foo.com Set Secret base64-encoded string Cd /Radius/RemoteServers Add ddnsTesting Dynamic DNS with radclient Cd /Radius/ResourceManagers Add ddnsSave the changes you have made Set p acctrequest Start bob Cd /opt/CSCOar/bin AregcmdTrace Launch radclient Cd /opt/CSCOar/bin Radclient Acctrequest Start usernameOL-17221-02 Configuring Specific Groups Configuring GroupsCreating and Setting Group Membership Cd /Radius/UserLists/Default/jeanCd /Radius/UserGroups Using a Script to Determine Service Configuring a Default GroupSet Group Default Configuring Multiple UserListsPopulating UserLists Configuring Separate UserListsConfiguring Users Creating Separate UserListsConfiguring Services Creating Separate ServicesCreating the Script Cd /Radius Configuring the ScriptClient Scripting Choosing the Scripting PointConfiguring a Remote Server for AA Handling Multiple ScriptsAdd ParseUserName Rex libParseUserName.so ParseUserName Add QuickExample Configuring the Remote ServerCreating a RemoteServer Cd /Radius/RemoteServersSet protocol ldap Use the set command to specify the protocol ldapCreating Services Add remote-ldap Remote Ldap ServiceSet type ldap Use the set command to change the DefaultAuthorization Configuring Multiple Remote ServersChanging the Authentication and Authorization Defaults Set DefaultAuthentication remote-ldapConfiguring Two Remote Servers Creating RemoteServersAdd North Creating the Services Set IncomingScript ParseRemoteServers Use the cd command to change to the Scripts objectConfiguring Session Management Configuring a Resource ManagerCreating a Resource Manager Creating a Session Manager Configuring a Session ManagerSet 1 rm-100 Configuring Session ManagementUse the reload command to reload the Cisco AR server Enabling Session ManagementPPP SymbolsOverview Solaris DefaultAuthorizationServiceDefault ports Default-PPP-users Installing CAR on LDomsRoundRobin policy RPC services MultipleServersPolicy 5-6,5-11,5-14Reloading Reloading server Remote Servers Sample users Save command Transactions per secondDefinition Well-known ports
Related manuals
Manual 214 pages 55.15 Kb Manual 34 pages 46.13 Kb

4.2 specifications

Cisco Systems, a global leader in IT and networking solutions, has consistently evolved to meet the demands of modern enterprises. One of its noteworthy offerings is Cisco Systems 4.2, a version that embodies a significant leap in networking technology and capability. With its rich set of features, Cisco Systems 4.2 caters to a wide range of industries, facilitating enhanced performance and security.

One of the main features of Cisco Systems 4.2 is its improved scalability. The architecture has been designed to support an ever-increasing number of devices and users, making it ideal for growing enterprises. The enhanced scalability allows organizations to expand their network capacities without compromising performance, ensuring seamless integration of new technologies and devices.

Another critical aspect of Cisco Systems 4.2 is its advanced security protocols. With cyber threats constantly evolving, Cisco prioritizes security in this version by offering robust features such as end-to-end encryption, improved firewall capabilities, and enhanced intrusion detection systems. These security enhancements provide organizations with peace of mind, knowing that their sensitive data and networks are well-protected from unauthorized access and potential threats.

Cisco Systems 4.2 also introduces intelligent automation features, which significantly streamline network management. Through the use of artificial intelligence and machine learning, Cisco enables organizations to automate routine tasks, reduce human error, and optimize performance. This automation not only enhances efficiency but also allows IT teams to focus on strategic initiatives rather than day-to-day maintenance.

Moreover, Cisco Systems 4.2 emphasizes infrastructure flexibility. The new architecture supports various deployment models, including on-premises, cloud, and hybrid environments. This flexibility enables organizations to adapt their networking strategies according to their specific needs and operational requirements, facilitating a more tailored approach to IT infrastructure.

Collaboration tools have also been enhanced in this version. Cisco Systems 4.2 integrates advanced communication solutions that empower teams to collaborate in real time, regardless of their geographical location. Features such as high-definition video conferencing, secure messaging, and file sharing enhance productivity and foster innovation across teams.

In summary, Cisco Systems 4.2 stands out as a forward-thinking networking solution with key features such as scalability, advanced security, intelligent automation, flexible infrastructure, and enhanced collaboration tools. These characteristics position Cisco Systems 4.2 as an invaluable asset for enterprises striving for digital transformation in an increasingly interconnected world. The ongoing innovation reflects Cisco's commitment to delivering cutting-edge technology solutions that drive business success and resilience.